Analysis

  • max time kernel
    161s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 14:57

General

  • Target

    5659aee0b2eda9432e6622a2b76b97407ed9c8990164d087a5b7eabd186ec0df.dll

  • Size

    212KB

  • MD5

    74a9959855a92b3eb1b73b9920a986f0

  • SHA1

    d5f7e583be36ef382a3c71fbeec3d9e2a70d23d9

  • SHA256

    5659aee0b2eda9432e6622a2b76b97407ed9c8990164d087a5b7eabd186ec0df

  • SHA512

    9cf3111eac2007caeed0b2b951edf6c600c69d6196337f2b0d56c8526f664c7c08f8e6bdf7a0022917bb142f30b67edfb679a415ff24254b781a95f6f850ec2e

  • SSDEEP

    1536:R3KMyX5b09R7DwdS1h7WJkiFz4+zxEnP4WEcdyN4HZgyHubO9ntswYQqlkK:9LytiQdSzyJFFCP4WEDwyIGwYQql

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\5659aee0b2eda9432e6622a2b76b97407ed9c8990164d087a5b7eabd186ec0df.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\5659aee0b2eda9432e6622a2b76b97407ed9c8990164d087a5b7eabd186ec0df.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:1780

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1780-133-0x0000000010000000-0x0000000010043000-memory.dmp

          Filesize

          268KB